{"id":3818,"date":"2025-03-24T12:38:10","date_gmt":"2025-03-24T17:38:10","guid":{"rendered":"https:\/\/uwm.edu\/officeofresearch\/?page_id=3818"},"modified":"2026-04-23T11:43:02","modified_gmt":"2026-04-23T16:43:02","slug":"data-security","status":"publish","type":"page","link":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","title":{"rendered":"Data Security"},"content":{"rendered":"\n<p><a href=\"https:\/\/uwm.edu\/policy\/library\/research-data-management\/\">UWM Research Data Management Policy<\/a><\/p>\n\n\n\n<p>UWM SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/information-technology\/policies\/uwm-system-security-guidelines\/\">UWM System Security Guidelines<\/a><\/p>\n\n\n\n<p>Per UW System Data Protections Procedure 1031.B, \u201cAll information shall be kept in a manner consistent with appropriate controls and procedures commensurate with its data classification the protections outlined in UW System Administrative Procedure 1031.B, Information Security: Data Protections.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/information-technology\/cybersecurity\/\">UWM Cybersecurity Program<\/a><\/p>\n\n\n\n<p>The Information Security Office supports the Chief Information Officer and the campus by leading and managing campus efforts to reduce risk. Strategies include appropriate handling of data, continued diagnostics, and good processes and procedures to manage our intellectual property and other sensitive information.<\/p>\n\n\n\n<p><a href=\"https:\/\/uwm.edu\/hr\/compliance-training\/\">Information Security Awareness<\/a><\/p>\n\n\n\n<p>All UWM employees are required by UW System policy to receive Information Security Awareness training.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>UWM Research Data Management Policy UWM SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer. UWM System Security Guidelines &hellip;<\/p>\n","protected":false},"author":1650,"featured_media":0,"parent":1962,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","uwm_wg_additional_authors":[39448]},"class_list":["post-3818","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.5 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Office of Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security\" \/>\n<meta property=\"og:description\" content=\"UWM Research Data Management Policy UWM SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer. UWM System Security Guidelines &hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Office of Research\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-23T16:43:02+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/\",\"name\":\"Data Security - Office of Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#website\"},\"datePublished\":\"2025-03-24T17:38:10+00:00\",\"dateModified\":\"2026-04-23T16:43:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Research Integrity &amp; Compliance\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Research Security\",\"item\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/research-integrity\\\/research-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#website\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\",\"name\":\"Office of Research\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#organization\",\"name\":\"University of Wisconsin - Milwaukee\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/wp-content\\\/uploads\\\/sites\\\/577\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"contentUrl\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/wp-content\\\/uploads\\\/sites\\\/577\\\/2020\\\/11\\\/uwm-seo-logo.jpg\",\"width\":225,\"height\":224,\"caption\":\"University of Wisconsin - Milwaukee\"},\"image\":{\"@id\":\"https:\\\/\\\/uwm.edu\\\/officeofresearch\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Office of Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","og_locale":"en_US","og_type":"article","og_title":"Data Security","og_description":"UWM Research Data Management Policy UWM SAAP 14-9 provides a general framework and expectations around research data and its stewardship, retention, accessibility, and security. In addition, this policy provides guidance on matters of research data transfer. UWM System Security Guidelines &hellip;","og_url":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","og_site_name":"Office of Research","article_modified_time":"2026-04-23T16:43:02+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","url":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/","name":"Data Security - Office of Research","isPartOf":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#website"},"datePublished":"2025-03-24T17:38:10+00:00","dateModified":"2026-04-23T16:43:02+00:00","breadcrumb":{"@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/uwm.edu\/officeofresearch\/"},{"@type":"ListItem","position":2,"name":"Research Integrity &amp; Compliance","item":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/"},{"@type":"ListItem","position":3,"name":"Research Security","item":"https:\/\/uwm.edu\/officeofresearch\/research-integrity\/research-security\/"},{"@type":"ListItem","position":4,"name":"Data Security"}]},{"@type":"WebSite","@id":"https:\/\/uwm.edu\/officeofresearch\/#website","url":"https:\/\/uwm.edu\/officeofresearch\/","name":"Office of Research","description":"","publisher":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/uwm.edu\/officeofresearch\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/uwm.edu\/officeofresearch\/#organization","name":"University of Wisconsin - Milwaukee","url":"https:\/\/uwm.edu\/officeofresearch\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/uwm.edu\/officeofresearch\/#\/schema\/logo\/image\/","url":"https:\/\/uwm.edu\/officeofresearch\/wp-content\/uploads\/sites\/577\/2020\/11\/uwm-seo-logo.jpg","contentUrl":"https:\/\/uwm.edu\/officeofresearch\/wp-content\/uploads\/sites\/577\/2020\/11\/uwm-seo-logo.jpg","width":225,"height":224,"caption":"University of Wisconsin - Milwaukee"},"image":{"@id":"https:\/\/uwm.edu\/officeofresearch\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/users\/1650"}],"replies":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/comments?post=3818"}],"version-history":[{"count":7,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3818\/revisions"}],"predecessor-version":[{"id":4946,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/3818\/revisions\/4946"}],"up":[{"embeddable":true,"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/pages\/1962"}],"wp:attachment":[{"href":"https:\/\/uwm.edu\/officeofresearch\/wp-json\/wp\/v2\/media?parent=3818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}